14 comments

Any of these firewalls and network security devices can detect a proxy as soon as you connect to it. All they have to do to determine if it is a proxy or a web site it to try and connect themselves. If they get a response the security software knows it’s a proxy and you’re blocked. The only question is whether the system is set to auto block or does it email the admin and let him do it manually, which can buy a few hours.
The other problem is that you are breaking numerous laws by trying to hack a government (most schools are government run) security system.
So let’s say you get a proxy to work for a bit. What do you get? A lot of these are hacker pots designed to either steal your information or plant bots on your computer that they can use. Even if it’s not a hacker pot it’s probably loaded with advertisements as that’s how the owner is making money. In either case the owner has no incentive to provide fast response or high bandwidth.
At the end of the day you’re just wasting a lot of time that could be spent doing something more productive.
See more about dangerous proxies in the article below: